Uploaded by The Hippo Dude

Topic 1 computer science

advertisement
Computer science notes
Topic 1
Topic 1.1.1
Identify the context for which a new system is planned.
A new system is planned to replace an old system that is:




Inefficient
Redundant
Outdated
No longer suitable for its original purpose
A computer system includes:



Hardware
Software
People working with it or using it
Updating a system may require:



Training employees
Firing employees
Changing the server’s location
Some organizational issues include:




Lack of attention to training
Lack of end user ownership of a system
Lack of stake holder and end user participation
Lack of guiding organizational and business strategies.
A feasibility report should be conducted and includes:
T – Technical feasibility
E – Economic feasibility
L – Legal feasibility
O – Operational feasibility
S – Schedule feasibility
Topic 1.1.2
Describe the need for change management.
Change management involves shifting the following from the present state to a desired state:




individuals
teams
departments
organizations
The goal is to:


Maximize benefits
Minimize negative impacts of change on individuals
Examples of negative impacts:


Employees need proper training
Employees fear losing their jobs
Topic 1.1.3
Outline compatibility issues resulting from situations including legacy systems or business mergers
Legacy system: old technology, hardware, computer system or application program.
Reasons a legacy system may still be in use:


Data cannot be converted to a newer format
Applications cannot be upgraded
Business merger: the combining of two or more business entities.
Businesses merge mainly to reduce costs.
The departments of both companies need to ensure that all subsystems are compatible.
The four strategies of integration are:
1.
2.
3.
4.
Keep both information systems – high maintenance cost
Replace both information systems – High initial cost
Select best information systems from each company and combine them – difficult for employees
Select one company’s information system and drop the other – policy problems
Compatibility issues with business mergers:


Language difference – Communication problems
Software incompatibility – The different software systems cannot operate satisfactorily,
cooperatively, independently or on the same computer
Topic 1.1.4
Compare the implementation of systems using a client’s hardware with hosting systems remotely.
SaaS (Hosted remotely) (Software as a service): A delivery software that allows data to be hosted and
managed on a remote data center.
SaaS benefits:






Less expensive
Company only needs to adjust SaaS subscription monthly as required
Only web browser required to access SaaS applications
Wide range of devices support SaaS
Requires few IT personnel
Safe (Data is stored in cloud)
SaaS disadvantages:



Possibility of data loss
Performance is low when compared to running on a local machine
SaaS integration is difficult
A locally hosted system is best for bigger company’s (Apple, Google, Amazon, etc.)
A remotely hosted system is best for smaller companies that don’t have the necessary equipment or
when the administration wants to outsource the responsibilities.
Topic 1.1.5
Evaluate alternative installation processes.
During the installation of a new system the old system will be retired and replaced with the new system.
The implementation(Changeover, conversion) methods are:
Parallel – Both systems work in parallel for a period of time.
Benefits:
1)
2)
3)
4)
Limited risk
Outputs of both systems can be compared to ensure new system runs properly
If the new system fails, the company can return to the old system
The old system can be terminated when the company is satisfied with the new systems output
Drawbacks:
1) Extra costs and workload
2) Various organizational tasks
3) Not efficient
Big bang (direct, immediate) changeover – Immediately switch old system with new one.
Benefits:
1) Low initial cost
Drawbacks:
1) Extremely risky
2) All users need to be trained properly before the switch
Pilot – New system is introduced in one of the sites and is extended to other sites over time.
Benefits:
1) Low risk
2) Pilot site can serve as a model for other sites
Drawbacks:
1) None
Phased – One module of the system is converted at a time until the whole system is implemented.
Benefits:
Not much risk
Drawbacks:
Very time consuming
Training period is extended
Topic 1.1.6
Discuss problems that may arise as a part of data migration.
Data migration is the transfer of data between different formats, storage types and computer systems.
Problems that arise with data migration:



Incapability of moving the information
Data may be lost or not transferred
Data can be misinterpreted
Topic 1.1.7
Suggest various types of testing.
The different types of testing are:











Functional testing
Data testing
Alpha testing
Beta testing
Dry run testing
During unit testing
Integration testing
User acceptance testing
Debugging
Verification
Validation
Topic 1.1.8
Describe the importance of user documentation.
User documentation is a crucial part of a system as it is the document that explains the working of the
system to the user.
A well-made user documentation guides the user through using the system and thus increases
productivity. If the user documentation is simple, system implementation can happen faster because
users require less training to learn how to use the new system.
Users are non-technical people, they only need to know how to use the system. Therefore, the user
documentation does not involve detailed explanations of how the system works.
Topic 1.1.9
Evaluate different methods of providing user documentation.
The different methods of providing user documentation are:
Manuals:
Advantages:




Can be provided online or offline
Potential use of multimedia features
Can be downloaded and printed
Can be read without using a PC or the internet
Disadvantages:


Can be lost if printed
Sometimes limited to a booklet
Email support:
Advantages:


Can be provided via email
Can resolve any problems by contacting the support team.
Disadvantages:


Users need an internet connection
Users need to familiar with computers
Topic 1.1.10
Evaluate different methods of delivering user training.
The different methods of delivering user training:

Self-instruction/study:
Users teach themselves in their own time with recourses that are provided.
Advantages:


No tuition fees
User can study whenever they want
Disadvantages:


No guidance
Final results depend on user motivation

Formal classes:
Several students learning in the same class.
Advantages:



Allows students to exchange ideas
Direct interaction with the expert
No technical communication barriers
Disadvantages:


Disadvantages shy students
Obstruct a students learning ability by letting other students dominate the discussion.

Online training:
Learning in an online classroom.
Advantages:





Can be accessed from anywhere in the world
Very time efficient
Can be accessed at any time of day
Contributes to self-direction
Promotes critical thinking
Disadvantages:




Need access to online learning environment
Some students may be excluded
Must have IT skills to function
Inappropriate for more dependent and immature learners because of high responsibility
Topic 1.1.11
Identify a range of causes of data loss
Data loss is when data is destroyed due to system failure, storage negligence or transmission or
processing errors.
Causes of data loss:













Accidental deletion
Administrative errors
Data misplacement
Building fires
Closing the program without saving the file
Computer viruses
Continued use after signs of failure
Data corruption
Firmware corruption
Natural disasters
Outsiders deleting, stealing or altering information
Physical damage of the storage device
Power failure
Topic 1.1.12
Outline the consequences of data loss in a specified situation.
If a patient’s medical records are lost:




life could be in danger.
Painful examination may have to be repeated.
Retrieval of the data may be time consuming
Retrieval may not always be possible.
Topic 1.1.13
Describe a range of methods that can be used to prevent data loss.
Methods which can be used to prevent data loss:







Regular backing up of files
Firewall installations
Data storage in multiple locations
Removed hard copies
Anti-virus software
Human error reduction techniques
Online auto save backups
Redundancy:
Duplication of storage devices and data.
Removeable media:
Non-volatile storage devices used for fast backup and storage data that can store data permanently.
Failover system:
A computer system that switches to a spare system upon hardware failure. The secondary sever
becomes the primary server automatically.
Switchover system:
The primary and secondary servers interchange the primary role.
Topic 1.1.14
Describe strategies for managing releases and updates.
Strategies for managing releases:




Patches – Fixing know bugs and vulnerabilities
Updates – Add new functionalities or fixing known bugs
Upgrades – Novel functionalities or characteristics and cumulative bug fixes
Releases – Final working versions of software applications
Topic 1.2.1
Define the terms: hardware, software, peripheral, network, human resources.
Hardware:
Physical components of a computer
Software:
Programs and data. A series of instructions that can be understood by a CPU
Peripheral:
Any auxiliary device that can work with a computer. Input/Output devices
Network:
Computer systems that are interconnected and share resources and data
Human resources:
People who are or could be used in an organization, business or economy
Topic 1.2.2
Describe the roles that a computer can take in a networked world.
The roles a computer can take in a networked world:






Client – Receives data via the network
Server – Has saved data on it and offers it to other clients
E-mail server – Manages the flow of email in and out of the networks
Domain name system server – Attributes names to network addresses
Router – Accepts incoming quanta of information reads their destination and distributes them
Firewall - Controls data flow access among network entities
Topic 1.2.3
Discuss the social and ethical issues associated with a networked world.
The social and cultural issues with a networked world:










Reliability – How well an IT system functions
Integrity – Protecting the completeness and accuracy of data
Inconsistency – duplicated data
Security – Protection of hardware, software and computer networks
Authenticity – Proving identity
Privacy – What extent data is used and disseminated to others
Anonymity – Conceal identity
Intellectual property – ideas, discoveries, photographs and films
Digital divide and equality of access – Inequal access
Surveillance – Using IT to monitor individuals





Globalization and cultural diversity – IT help diminish importance boundaries
IT policies – Procedures and measures that promote appropriate use of computers and networks.
Standards and protocols – Rules and conventions that hardware developers follow
People and machines – interactions between IT and humans
Digital citizenship – Appropriate behavior in a digital world
Topic 1.2.4
Identify the relevant stakeholders when planning a new system.
Stakeholders:
Individuals, teams, groups or organizations that are interested in the realization of a project or may be
affected by the outcome of a project.
Relevant stakeholders:

Frequent users of the system – Able to identify flaws and propose improvements.
Topic 1.2.5
Describe methods of obtaining requirements from stakeholders.
Methods of obtaining requirements from stakeholders:



Interviewing stakeholders – Face to face procedures that obtains reliable data in the form of verbal
responses from a person or group
Questionnaires – Surveys that focus on taking samples from the population
Observation – Spending time in different departments and observing
Topic 1.2.6
Describe appropriate techniques for gathering the information needed to arrive at a workable solution.
Techniques for gathering information:




Examining current systems – Examination of the current system and analysis of its functions and
procedures
Literature search – Identification, retrieval and management of various sources in order to find
information on a topic
Online databases – Search engines and information they provide
Competing products – Analysis of competitive factors their benefits and vulnerabilities
Topic 1.2.7
Construct suitable representations to illustrate system requirements.
The ways to illustrate system requirements:
System flow charts - Diagrams representing how different parts of the
system are linked together and how the system should work in general.
Data flow diagram - Diagram representing how data is moving through the
system.
Structure diagram - Diagrams representing the organization of a system,
usually with showing the different parts in hierarchical order.
Topic 1.2.8
Describe the purpose of prototypes to demonstrate the proposed system to the client.
A prototype:






Attracts a client’s attention
Provides enough of the concept for the investors to decide if they want to fund the project
Encourages participation between users and developers
Gives an idea of the final product
Helps identify problems
Increases system development speed
Topic 1.2.9
Discuss the importance of iteration during the design process.
Iteration:





Makes developers reconsider choices
Decides how the final product will look and function
Modifies the system
Improves the design
Makes sure everything works
Topic 1.2.10
Explain the possible consequences of failing to involve the end-user in the design process.
Consequences of failing to involve end users in the design process:



Unlikely to be successful
Developed system may solve a different problem
Developed system may deal with issues outside of the projects scope
Topic 1.2.11
Discuss the social and ethical issues associated with the introduction of new IT systems.
Issues with the introduction of new IT systems:

Machines replacing humans causing unemployment
Topic 1.2.12
Define the term usability.
Usability: The potential of a service, product or website to achieve user goals.
Topic 1.2.13
Identify a range of usability problems with commonly used digital devices.
GPS problems:
1. Small screen
2. Outdated street data
3. Inaccurate geographical data
Tablets:
1. Accidental touches
2. Small side buttons
3. Poorly written instructions
Game consoles:
1. Small screen
2. Short battery life
3. Buttons may be too small
PC’s:
1. Eyesight problems
2. Distracting reflections on screen
3. Difficult for left-handed people to use
Digital cameras:
1. Incorrect calibration of touch screen menus
2. Buttons are too small
3. Requires specific software to connect to a coputer
Phones:
1. Small keyboard
2. Some users may not need all of the features
MP3’s:
1. Small buttons
2. Fragile
3. Insufficient memory
Topic 1.2.14
Identify methods that can be used to improve the accessibility of systems.
Visual impairments:
Input:

Braille input devices
Output:

Speech output devices
Hearing and speech impairments:
Input:

No problems
Output:

Visual sound effects and subtitles
Cognitive problems and learning disabilities:
Input and output devices:

Mobility impairments:
Identify a range of usability problems that can occur in a system.
Discuss the moral, ethical, social, economic and environmental implications of the interaction
between humans and machines.
Download